Trouble viewing this email? View in web browser
Organizations can’t stop the world from changing. The best they can do is adapt. The smart ones change before they have to.

Nicole Perlroth, Author & Advisor, Cybersecurity and Infrastructure Security Agency
Cybersecurity, in conversation with Nicole Perlroth
Kyle Fiehler, Sr. Transformation Analyst
Are we concerned with the right threats? Are we even focused on the right adversaries? How can we maintain cybersecurity in the face of an economic downturn?
Today's IT leaders face difficult and largely unprecedented uncertainties. We know that crowdsourcing the wisdom of peers is key to remaining successful in the face of novel threats. That's why we're excited to announce this year’s CXO Summit Live tour, where executives can listen to and connect with peers tasked with overcoming the same challenges.
To kick off the in-person series, New York Times bestselling author and U.S. Cybersecurity and Infrastructure Security Agency (CISA) advisor Nicole Perlroth will describe the cyber threat landscape next month in Silicon Valley. Drawing from her reporting, Perlroth will describe how today's cyber threats are expediting cooperation between the private and public sectors.
Don't miss this speaker whose storytelling has been compared to that of Michael Crichton and John le Carré. Register to join us at the September CXO Summit Live, or view upcoming in-person summits in your region.
Note: This will not be Nicole’s first keynote with us. Last October, we had a virtual summit focused on ransomware. View it on demand: What to do when the bad guys are winning.

Are conventional cybersecurity tactics
leading you to defeat?
Dan Ballmer, Sr. Transformation Analyst
Today’s organizations are fighting cyberattacks using strategies that
have historically failed in a combat environment. While there are many differences between conventional warfare and cybersecurity, there are also enlightening similarities. One example is the concept of
asymmetrical warfare.
Organizations spend money on a vast array of tools, infrastructure, and security services to fortify themselves against attacks. Larger ones have
a security operations center (SOC), staffed by trained professionals who perform ‘round-the-clock monitoring of the environment. Similar to a standing army, businesses have formidable cyber “weapons,” they
remain on high alert, and operate according to extensively
documented procedures.
Now, let’s look at the capabilities of their opponents, who have neither the numbers nor the means to “fight fair” against fortified organizations.
CXO REvolutionaries:
Podcast Center
Tune in to the latest voices from across our community of CIOs, CTOs, and CISOs for actionable advice and get inspired by some of the most passionate personalities in the industry.
Get up to speed on the art and science of training models, big data sets, and limitations and possibilities for AI in cybersecurity and beyond. Zscaler Vice President of AI and Machine Learning Howie Xu has been a pioneer in applying AI and ML to cybersecurity since the late 1990s. In this episode, he is joined by VP and CISO AMS - Brad Moldenhauer, and host Sean Cordero to discuss the state of applied ML and AI and the future.
Listen now
The man without a title joins hosts Lisa Lorenzin and Pam Kubiatowski to discuss the art of talking about technical topics with non-specialists. The master communicator says he stays focused on the “why” when trying to explain complex technologies – and discusses how virtual whiteboarding can be more effective at making a case for an IT purchase than doing it in person.
Listen now
Editor's Picks
As you may have heard, zero days are popping up at an unprecedented rate. It turns out that zero days are enabled by a fundamental underpinning of the internet today, but this bug can be disabled if we simply let go of legacy notions of trust (and our outsized notions of good manners when it comes to fielding packet requests).
How the TCP/IP protocol makes
zero days more dangerous
I was working for a utility company in 2008 when a bubble burst in the housing market and caused the economy to collapse. We were all asked to tighten our belts. I knew then that I had to reduce spending on software solutions rather than staff. It’s fair to ask if we're headed toward our next recession.
The former CIO for the
State of Wisconsin talks security spending
Ever stepped on a Lego block? It hurts, doesn’t it! If not, imagine for a moment that it’s 2 a.m. and you’re navigating your way to the bathroom in the dark. Your child has spent the day building a perfect Lego Death Star, which you suspect unfortunately still lies somewhere on the floor ahead of you. The chances of you finding and stepping on that doomed space station are hopefully low.
How stepping on Lego can be a bit like going cloud-native
Headed into the second half of 2022, the rate of new cybersecurity threats is not slowing but accelerating. Consider that, in June 2022, the United States Cybersecurity and Infrastructure Agency (CISA) listed 49 new "known-exploited" vulnerabilities in its online catalog. I’m a staunch advocate of CISA’s focus on exploitabilities rather than vulnerabilities.
Brush up on the difference between the two
When moving to the cloud, companies approach it with a number of different models – SaaS, IaaS, and PaaS most commonly. But moving to the cloud shouldn’t obscure the fact that what you’re really looking for is a zero trust security model.
How the cloud models do (and don’t) affect zero trust
Contact the Customer Experience & Transformation Team: [email protected]

Contact REvolutionaries Editor-in-Chief Chris Jablonski at [email protected]
LP-Asset-Aid-v1_twitter.pngFollow us on Twitter: @zscaler
Connect on LinkedIn: CXO REvolutionaries
Sponsered By
logo-zscaler-white 139x30.png